Conferences related to Computer viruses

Back to Top

2011 3rd International Workshop on Education Technology and Computer Science (ETCS)

ETCS2011 will be held on 12-13 March, 2011 in Wuhan, China. ETCS2009 and ETCS2010 have been indexed by EI Compendex and ISTP. The ETCS2011 will bring together the top researchers from Asian Pacific nations, North America, Europe and around the world to exchange their research results and address open issues in Education Technology and Computer Science.

  • 2010 2nd International Workshop on Education Technology and Computer Science (ETCS)

    The 2nd International Workshop on Education Technology and Computer Science (ETCS2010) will be held on 6-7 March, 2010 in Wuhan, China. The workshop will bring together the top researchers from Asian Pacific nations, North America, Europe and around the world to exchange their research results and address open issues in Education Technology and Computer Science.

  • 2009 First International Workshop on Education Technology and Computer Science (ETCS)

    ETCS2009 is organized by Huazhong Universiy of Science and Technology, Harbin Institute of Technology,and supported by IEEE Harbin Section, Huazhong Normal University,Wuhan University. ETCS 2009 will be convened in the magnificent cultural city - Wuhan, China. ETCS 2009 will bring experts from several continents to give presentations, exchange information and learn about the latest developments in the field of education and computer science.


2010 Second International Conference on Computational Intelligence and Natural Computing (CINC)

The CINC 2010 conference provides a forum for engineers and scientists in academia, industry, and government to address profound issues including technical challenges, safety, social, legal, political, and economic issues, and to present and discuss their ideas, results, work in progress and experience on all aspects of computational intelligence and natural computing.



Periodicals related to Computer viruses

Back to Top

Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Information Theory, IEEE Transactions on

The fundamental nature of the communication process; storage, transmission and utilization of information; coding and decoding of digital and analog communication transmissions; study of random interference and information-bearing signals; and the development of information-theoretic techniques in diverse areas, including data communication and recording systems, communication networks, cryptography, detection systems, pattern recognition, learning, and automata.


Systems, Man, and Cybernetics, Part B, IEEE Transactions on

The scope of the IEEE Transactions on Systems, Man and Cybernetics Part B: Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or between machines, humans, and organizations. The scope of Part B includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, ...




Xplore Articles related to Computer viruses

Back to Top

Understanding the evolution process of program source for investigating software authorship and plagiarism

Jeonghoon Ji; Suhyun Park; Gyun Woo; Hwangue Cho 2007 2nd International Conference on Digital Information Management, 2007

This paper addresses the evolution process of program source codes to establish the framework for software authorship identification. Since program code cheating is getting serious in academic institutions, we will be able to apply the software authorship identification tool as a detection tool for code plagiarism. The main contribution of our work is twofold. First, we have devised new asymmetric ...


Evaluation of Run-Time Detection of Self-Replication in Binary Executable Malware

A. Volynkin; V. A. Skormin; D. H. Summerville; J. Moronski 2006 IEEE Information Assurance Workshop, 2006

This paper presents an overview and evaluation of a novel approach for proactive protection against both known and previously unknown self- replicating malicious software. Instead of deciphering and screening suspect code for signatures of known viruses the approach monitors the runtime behavior of binary compiled executable code by monitoring its system calls. The detection mechanism, which works from the perspective ...


Research on computer virus source modeling with immune characteristics

Zhi-juan Jia; Yan-yan Yang; Na Guo 2017 29th Chinese Control And Decision Conference (CCDC), 2017

Existing computer virus direction of the study focused on the characteristics of virus propagation, and few people study the problem of computer virus source, but the source of computer virus can eliminate the source of the virus to quickly inhibit the spread of computer viruses. Therefore, the article mainly on the source of the virus problem modeling, by observing the ...


Network Finance Security Problems and Countermeasures

Danwa Feng; Wenbin Hao; Tingxue Ding 2009 International Symposium on Computer Network and Multimedia Technology, 2009

Network in particular, the Internet's open architecture and unfettered access to the corporate accounting system at the same time a qualitative change has also increased the sensitivity of some valuable data or risk of abuse. In particular, the financial data is an important trade secrets, such as damaged or leak, will result in an immeasurable loss, and thus to ensure ...


Information Security: User Precautions, Attacker Efforts, and Enforcement

I. P. L. Png; Qiu-Hong Wang 2009 42nd Hawaii International Conference on System Sciences, 2009

We analyze the strategic interactions among end-users and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by end-users are strategic substitutes. This explains the inertia among users in taking precautions even in the face of grave potential consequences. Generally, information security can be addressed from two angles - facilitating end-user precautions and enforcement against attackers. ...


More Xplore Articles

Educational Resources on Computer viruses

Back to Top

eLearning

Understanding the evolution process of program source for investigating software authorship and plagiarism

Jeonghoon Ji; Suhyun Park; Gyun Woo; Hwangue Cho 2007 2nd International Conference on Digital Information Management, 2007

This paper addresses the evolution process of program source codes to establish the framework for software authorship identification. Since program code cheating is getting serious in academic institutions, we will be able to apply the software authorship identification tool as a detection tool for code plagiarism. The main contribution of our work is twofold. First, we have devised new asymmetric ...


Evaluation of Run-Time Detection of Self-Replication in Binary Executable Malware

A. Volynkin; V. A. Skormin; D. H. Summerville; J. Moronski 2006 IEEE Information Assurance Workshop, 2006

This paper presents an overview and evaluation of a novel approach for proactive protection against both known and previously unknown self- replicating malicious software. Instead of deciphering and screening suspect code for signatures of known viruses the approach monitors the runtime behavior of binary compiled executable code by monitoring its system calls. The detection mechanism, which works from the perspective ...


Research on computer virus source modeling with immune characteristics

Zhi-juan Jia; Yan-yan Yang; Na Guo 2017 29th Chinese Control And Decision Conference (CCDC), 2017

Existing computer virus direction of the study focused on the characteristics of virus propagation, and few people study the problem of computer virus source, but the source of computer virus can eliminate the source of the virus to quickly inhibit the spread of computer viruses. Therefore, the article mainly on the source of the virus problem modeling, by observing the ...


Network Finance Security Problems and Countermeasures

Danwa Feng; Wenbin Hao; Tingxue Ding 2009 International Symposium on Computer Network and Multimedia Technology, 2009

Network in particular, the Internet's open architecture and unfettered access to the corporate accounting system at the same time a qualitative change has also increased the sensitivity of some valuable data or risk of abuse. In particular, the financial data is an important trade secrets, such as damaged or leak, will result in an immeasurable loss, and thus to ensure ...


Information Security: User Precautions, Attacker Efforts, and Enforcement

I. P. L. Png; Qiu-Hong Wang 2009 42nd Hawaii International Conference on System Sciences, 2009

We analyze the strategic interactions among end-users and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by end-users are strategic substitutes. This explains the inertia among users in taking precautions even in the face of grave potential consequences. Generally, information security can be addressed from two angles - facilitating end-user precautions and enforcement against attackers. ...


More eLearning Resources

IEEE-USA E-Books

  • Appendix C: Pointers to Additional Resources

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Index

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Appendix B: Codes of Ethics

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Computer Viruses as Artificial Life

    There has been considerable interest in computer viruses since they first appeared in 1981, and especially in the past few years as they have reached epidemic numbers in many personal computer environments. Viruses have been written about as a security problem, as a social problem, and as a possible means of performing useful tasks in a distributed computing environment. However, only recently have some scientists begun to ask if computer viruses are not a form of artificial life--a self-replicating organism. Simply because computer viruses do not exist as organic molecules may not be sufficient reason to dismiss the classification of this form of "vandalware" as a form of life. This paper begins with a description of how computer viruses operate and their history, and of the various ways computer viruses are structured. It then examines how viruses meet properties associated with life as defined by some researchers in the area of artificial life and self-organizing systems. The paper concludes with some comments directed toward the definition of artificially "alive" systems and experimentation.

  • About the Editor

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.



Standards related to Computer viruses

Back to Top

No standards are currently tagged "Computer viruses"


Jobs related to Computer viruses

Back to Top